shaddy43 / AES_Shellcode_EncryptorLinks
This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Process of encrypting shellcode is very important for injection processes to bypass signature based detection by the security controls.
☆16Updated 4 years ago
Alternatives and similar repositories for AES_Shellcode_Encryptor
Users that are interested in AES_Shellcode_Encryptor are comparing it to the libraries listed below
Sorting:
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 3 years ago
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- Golang Implementation of Hell's gate☆21Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- DLL Exports Extraction BOF with optional NTFS transactions.☆84Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆18Updated 6 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Citrix Phishlet☆24Updated 4 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 3 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆41Updated 4 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Updated 3 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- ☆61Updated 2 years ago
- ☆49Updated 2 years ago
- PoC-Malware-TTPs☆49Updated 2 years ago
- ☆21Updated last week
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Updated last year
- load dumped csharp binaries as assemblies and launch them in memory☆28Updated last year
- The Web UI for Antnium☆27Updated 3 years ago
- Run python from a single exe☆35Updated 3 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Updated 3 years ago